Please do not report security vulnerabilities through public GitHub issues.
Report security issues privately through GitHub's built-in security advisory flow:
This opens a private channel between you and the maintainer — no public disclosure until a fix is ready.
When reporting, please provide:
- A clear description of the vulnerability and its impact
- Steps to reproduce (proof-of-concept code, configuration, or network conditions)
- The affected version / commit
- Any mitigations you're aware of
- Acknowledgement: within 72 hours of receipt
- Triage and initial assessment: within one week
- Fix and disclosure timeline: discussed with the reporter on a per-issue basis, depending on severity and complexity
Security fixes target the latest commit on master. Older commits are not maintained.
In scope: the ASP.NET Core / Blazor Server app, its SQLite store, ADB / scrcpy / go2rtc / ws-scrcpy-web orchestration, email notification delivery, and the first-run wizard flow.
Out of scope:
- Vulnerabilities in upstream dependencies (ws-scrcpy-web, go2rtc, scrcpy, node-pty, EF Core, etc.) that have not been released against Control Menu — report those upstream.
- Issues requiring physical or console access to a host already running the app.
- Self-XSS or similar issues requiring the victim to paste attacker-controlled code into devtools.
- Anything that requires the reporter to have valid admin credentials on the host machine.
Thanks for helping keep the project safe.